DoorDash

DoorDash

DoorDash disclosed a **cybersecurity incident** on **November 13**, confirming a **data breach** caused by a **social engineering attack** targeting an employee on **October 25**. The unauthorized access exposed **personal information** of certain users, including **Dashers and merchants**, such as **names, email addresses, phone numbers, and physical addresses**. While DoorDash stated that **no sensitive data (payment details, government IDs, or Social Security numbers)** was compromised and no evidence of misuse (fraud/identity theft) was found, the breach sparked **public backlash** for downplaying the severity of exposed data (e.g., home addresses labeled as 'non-sensitive').The company **revoked access immediately**, notified affected users, and engaged law enforcement. To mitigate future risks, DoorDash is **reinforcing employee training** and **strengthening authentication protocols**. The incident coincides with **stock volatility** (down **21% this month**) and a separate **$18M legal settlement** with Chicago over deceptive business practices, adding to operational and reputational pressures.

Source: https://finance.yahoo.com/news/doordash-discloses-data-breach-18m-224652145.html

TPRM report: https://www.rankiteo.com/company/doordash-for-business

"id": "doo5632556111825",
"linkid": "doordash-for-business",
"type": "Breach",
"date": "10/2025",
"severity": "60",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'customers_affected': 'Certain Users (Dashers and '
                                              'Merchants)',
                        'industry': 'Technology / E-Commerce',
                        'location': 'United States (HQ: San Francisco, CA)',
                        'name': 'DoorDash',
                        'size': 'Large (Publicly Traded, NYSE: DASH)',
                        'type': 'Food Delivery Platform'}],
 'attack_vector': 'Social Engineering (Employee Targeted)',
 'customer_advisories': 'Public Notice Issued (November 13, 2023)',
 'data_breach': {'data_exfiltration': 'Likely (Unauthorized Access Confirmed)',
                 'personally_identifiable_information': ['Names',
                                                         'Email Addresses',
                                                         'Phone Numbers',
                                                         'Physical Addresses'],
                 'sensitivity_of_data': 'Moderate (No Financial/Payment Data '
                                        'or Government IDs)',
                 'type_of_data_compromised': ['Personal Information (PII)']},
 'date_detected': '2023-10-25',
 'date_publicly_disclosed': '2023-11-13',
 'description': 'DoorDash disclosed a cybersecurity incident where an '
                'unauthorized person accessed personal information of certain '
                'users (including Dashers and merchants) through a social '
                'engineering attack targeting an employee. The breach occurred '
                'on October 25, 2023, and was publicly disclosed on November '
                '13, 2023. Affected data included names, email addresses, '
                'phone numbers, and physical addresses, but no sensitive '
                'information like payment details, government IDs, or Social '
                'Security numbers was exposed. DoorDash revoked the '
                'unauthorized access, notified affected users, and is '
                'cooperating with law enforcement. The company is reinforcing '
                'employee training and authentication protocols to prevent '
                'future incidents.',
 'impact': {'brand_reputation_impact': 'Negative (Criticism for Data Handling, '
                                       'Stock Volatility)',
            'customer_complaints': 'Backlash on Reddit for Downplaying '
                                   'Severity of Exposed Data (e.g., Names and '
                                   "Home Addresses as 'Non-Sensitive')",
            'data_compromised': ['Names',
                                 'Email Addresses',
                                 'Phone Numbers',
                                 'Physical Addresses'],
            'identity_theft_risk': 'No Indication of Misuse (as of Disclosure)',
            'operational_impact': 'Minimal (Access Revoked Immediately)',
            'payment_information_risk': 'None (Payment Information Not '
                                        'Exposed)'},
 'initial_access_broker': {'data_sold_on_dark_web': 'No Indication (as of '
                                                    'Disclosure)',
                           'entry_point': 'Employee (Social Engineering)',
                           'high_value_targets': ['User Data (Dashers and '
                                                  'Merchants)']},
 'investigation_status': 'Ongoing (Law Enforcement Involved)',
 'lessons_learned': 'Importance of robust authentication protocols and '
                    'employee training to mitigate social engineering risks. '
                    'Need for clearer communication about the sensitivity of '
                    'exposed data (e.g., physical addresses).',
 'post_incident_analysis': {'corrective_actions': ['Reinforced employee '
                                                   'training on social '
                                                   'engineering risks.',
                                                   'Strengthened '
                                                   'authentication protocols '
                                                   '(details unspecified).'],
                            'root_causes': ['Inadequate authentication '
                                            'safeguards for employee accounts.',
                                            'Successful social engineering '
                                            'exploit targeting an employee.']},
 'recommendations': ['Implement multi-factor authentication (MFA) for employee '
                     'accounts with access to sensitive systems.',
                     'Conduct regular phishing/social engineering simulations '
                     'for employees.',
                     'Enhance transparency in breach disclosures to address '
                     'public concerns about data sensitivity.',
                     'Monitor dark web for potential misuse of exposed data.'],
 'references': [{'date_accessed': '2023-11-13',
                 'source': 'DoorDash Notice to Users'},
                {'date_accessed': '2023-11',
                 'source': 'Reddit User Discussions'},
                {'date_accessed': '2023-11',
                 'source': 'Shutterstock (Stock Performance Image)',
                 'url': 'https://www.shutterstock.com'}],
 'response': {'communication_strategy': 'Public Notice to Users (November 13, '
                                        '2023)',
              'containment_measures': ['Immediate Access Revocation'],
              'incident_response_plan_activated': 'Yes (Access Revoked, Users '
                                                  'Notified)',
              'law_enforcement_notified': 'Yes (Investigation Ongoing)',
              'remediation_measures': ['Reinforced Employee Training',
                                       'Strengthened Authentication '
                                       'Protocols']},
 'threat_actor': 'Unauthorized Individual (Unknown)',
 'title': 'DoorDash Data Breach via Social Engineering Attack (October 2023)',
 'type': ['Data Breach', 'Social Engineering Attack'],
 'vulnerability_exploited': 'Human Error / Lack of Authentication Protocols'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.